Abstract

This research focuses on gender-based analysis in information technology skills development among undergraduate students in a University. In the first part of this research we performed literature review to find out expectations of female students in computer science curriculum and to establish factors that hinder women from practicing IT profession....

Abstract

Computational Trust and Reputation models are the framework for measuring trust and reputation in online services, software and general service provision in the field of computing. This paper presents the adaptation, design and application of a Trust and Reputation model called ReGret....

Abstract

"UniModBase" is freeware information systems for modeling of grain size analysis and determine Rosin-Rammler and Gaudin-Shumann equations of particle size distribution based on algorithms for regression analysis. The algorithm is precisely defined procedures...

Abstract

PuMPE is a comprehensive resource that provides integrated information on metabolome of bacterial systems. The genome data is annotated to infer metabolic pathways using in-house tools and web-based sources. PuMPE introduces a novel aspect of metabolic categorization....

The mining of frequent itemsets is often challenged by the length of the patterns mined and also by the number of transactions considered for the mining process. Another acute challenge that concerns the performance of any association rule mining algorithm is the presence of „null? transactions. This work proposes a closed frequent itemset...

KLOC (Kilo Line of Code),.UCP (Use Case Point), FP (Function Point), these are all unit of software size. Software Efforts estimation, Person-month, Person-Hours these are units of efforts.

Abstract

According to Roger S Pressman “Software efforts estimation is not an exact science”. Day per day competition in the software industries is increasing; in such scenario accurate efforts estimation is become an important task. Efforts estimation is one of essential activity of software development...

Abstract

This research aims to enhance network routing algorithm to be most efficient and strong to face the most important routing problem, congestion. By using association rules for analyzing proposed database....

Abstract

This paper presents a new approach based on the use of a knowledge base, in order to improve the angular resolution of the permanent magnet (PM) stepper actuator. The use of this technique is justified by the limits of the conventional technique when the static torque...

Abstract

Information Technology (IT) is gaining ground in all areas of life and developing nations are taking advantage of this opportunity in various sectors including the development of health care systems....

Abstract

It is common to see that many telecommunications businesses IT-ICT systems are hosted within large data-driven telecommunications business telecommunications companies such as Verizon, after merging with former competitive companies, such as MCI.....

Abstract

HIV/AIDS epidemic is still a major societal problem in developing countries, especially in Africa. ICT (Information and Communication Technologies) is seen as one of the most important solutions in order to provide HIV/AIDS preventive education for all members of the society....

Abstract

Industrial and commercial wastes must be classified at least two times on the way from the owner of the waste to the waste disposal facility in order to ensure that waste handling is in conformity with the law. Wastes classification as dangerous goods is very difficult because they consist of many components with diverse dangerous properties. This paper presents a Web-based expert system we developed for the classification of wastes to overcome this difficulty. It joins the expert system intelligent knowledge and the capability of the Web to put the knowledge of experts anywhere the expert can’t go. The system uses a set of if-then rules to classify waste.